CVE-2023-33203

The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:05

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=2192667 - Not Applicable () https://bugzilla.redhat.com/show_bug.cgi?id=2192667 - Not Applicable
References () https://bugzilla.suse.com/show_bug.cgi?id=1210685 - Issue Tracking, Third Party Advisory () https://bugzilla.suse.com/show_bug.cgi?id=1210685 - Issue Tracking, Third Party Advisory
References () https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9 - Mailing List, Release Notes () https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9 - Mailing List, Release Notes
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75 - Mailing List, Patch () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75 - Mailing List, Patch

Information

Published : 2023-05-18 08:15

Updated : 2025-05-05 16:15


NVD link : CVE-2023-33203

Mitre link : CVE-2023-33203

CVE.ORG link : CVE-2023-33203


JSON object : View

Products Affected

linux

  • linux_kernel

redhat

  • enterprise_linux
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')